Jolly Technologies

Jolly Technologies

Jolly Technologies is a provider of ID and tracking, visitor management and asset tracking tools. Organizations can track members and attendance using bar codes and an open data architecture. It serves the education, healthcare, government, non profit and gym and club industries, among others. Jolly Technologies is a privately held company, founded in 2000 and is headquartered in Redwood City, CA.

Company Info

HQ Location
United States
Year Founded
2000
Employees
50
Website

Connect with Jolly Technologies

www.jollytech.com

Company Headquarters

Related News

  • Dec 9

    How Do You Change an Organizational Culture?

    In the last few years, we have witnessed a number of clear failures of culture in major organizations, including Wells Fargo, GM, Volkswagen and more. Sometimes, the failure leads to a violation of law or ethical values. But sometimes it can cause the organization to under-perform. Continue r...Read more

  • Dec 8

    What Every Business Needs to Know About Digital Transaction Management

    According to a recent research note issued by Aragon Research, the Digital Transaction Management (DTM) market will grow to $30 billion by 2020. What this means for businesses is that paper processes will begin to decline rapidly over the next few years within most sectors. Continue reading...

  • Dec 7

    Jitterbit Simplifies Harmony Platform With New 'Citizen Integrator' Release

    Jitterbit wants to put integration in the hands of non-developers with a product update designed to combine ease-of-use with enterprise grade scale-out capabilities. It's marketing its Harmony Winter '17 Citizen Integrator  — released today — as a comprehensive y...Read more

  • Dec 7

    Top B2B Industry Events (Dec. 7, 2016 to Jan. 31, 2017)

    Do you have a little extra time in coming weeks? Why not attend a face-to-face or online event? Our industry conference planner gives you a chance to map out your schedule. Continue reading...

  • Dec 6

    How Does Your Kill Chain Maturity Measure Up?

    In our work with Information Security (InfoSec) people at large, and with those in heavily regulated organizations, we typically find that they have the initial five steps in the cyber kill chain under control.  These primarily involve “building the moat,” i.e. Continue readin...Read more

Add a Product  

Suggest a Product

1 2 3